General
-
Target
2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader
-
Size
9.4MB
-
Sample
250421-2fa8bawyes
-
MD5
46e8bd935752ea7e517e1e494b44ec94
-
SHA1
c58a29bde28c9270ec75878cdefdc8adb0578300
-
SHA256
44e9bc74393f799d862141e41c87f6e83a27d66108a93998ead04c0bd21d0916
-
SHA512
f3ee6cd2a85e703978384525552472aadb798ab16b4f2c9522fe94a474d411322dbc2b1f73d1422872b474d24f9747b240a771081d90f9f0419289df75686cde
-
SSDEEP
98304:os0vXTBJYa5mknGzZr+HaOKSVPFtmOZ9G1rxwFB5URUSKnaSOProSCa:o3XTYQmknGzwHaOtVPHd9swFBubKL
Behavioral task
behavioral1
Sample
2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250410-en
Malware Config
Targets
-
-
Target
2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader
-
Size
9.4MB
-
MD5
46e8bd935752ea7e517e1e494b44ec94
-
SHA1
c58a29bde28c9270ec75878cdefdc8adb0578300
-
SHA256
44e9bc74393f799d862141e41c87f6e83a27d66108a93998ead04c0bd21d0916
-
SHA512
f3ee6cd2a85e703978384525552472aadb798ab16b4f2c9522fe94a474d411322dbc2b1f73d1422872b474d24f9747b240a771081d90f9f0419289df75686cde
-
SSDEEP
98304:os0vXTBJYa5mknGzZr+HaOKSVPFtmOZ9G1rxwFB5URUSKnaSOProSCa:o3XTYQmknGzwHaOtVPHd9swFBubKL
-
Blackmoon family
-
Detect Blackmoon payload
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-